{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:59:35Z","timestamp":1725454775952},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/isit.2010.5513772","type":"proceedings-article","created":{"date-parts":[[2010,8,19]],"date-time":"2010-08-19T19:57:25Z","timestamp":1282247845000},"page":"2573-2577","source":"Crossref","is-referenced-by-count":5,"title":["On cooperative secrecy for discrete memoryless relay networks"],"prefix":"10.1109","author":[{"given":"Etienne","family":"Perron","sequence":"first","affiliation":[]},{"given":"Suhas","family":"Diggavi","sequence":"additional","affiliation":[]},{"given":"Emre","family":"Telatar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"351","article-title":"Information-theoretic key agreement: From weak to strong secrecy for free","author":"maurer","year":"2000","journal-title":"Eurocrypt"},{"key":"ref11","article-title":"Relay channels with confidential messages","author":"oohama","year":"2006","journal-title":"IEEE Trans Inform Theory"},{"year":"2009","author":"perron","journal-title":"Information-Theoretic Secrecy for Wireless Networks","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/ITW.2009.5351484"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/INFCOM.2009.5062115"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ITA.2009.5044926"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TIT.1978.1055892"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1002\/0471200611"},{"key":"ref6","article-title":"Compound wiretap channels","author":"liang","year":"2008","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TIT.2008.928272"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ITWKSPS.2010.5503216"},{"key":"ref7","article-title":"Information Theoretic Security","author":"liang","year":"2009","journal-title":"Foundations and Trends in Communications and Information Theory"},{"key":"ref2","article-title":"Wireless network information flow: A deterministic approach","author":"avestimehr","year":"2009","journal-title":"IEEE Trans Inform Theory"},{"key":"ref1","article-title":"A deterministic approach to wireless relay networks","author":"avestimehr","year":"2007","journal-title":"Proc of the Allerton Conf on Commun Control and Computing"},{"key":"ref9","article-title":"The secrecy capacity of a class of parallel gaussian compound wiretap channels","author":"liu","year":"2008","journal-title":"Proc of the IEEE Int Symposium on Inform Theory"}],"event":{"name":"2010 IEEE International Symposium on Information Theory - ISIT","start":{"date-parts":[[2010,6,13]]},"location":"Austin, TX, USA","end":{"date-parts":[[2010,6,18]]}},"container-title":["2010 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5508195\/5513230\/05513772.pdf?arnumber=5513772","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T19:16:51Z","timestamp":1489864611000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5513772\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/isit.2010.5513772","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}